All Projects → jamf → CIS-for-macOS-High-Sierra-CP

jamf / CIS-for-macOS-High-Sierra-CP

Licence: MIT License
No description or website provided.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to CIS-for-macOS-High-Sierra-CP

CIS-for-macOS-Sierra-CP
CIS for macOS 10.12 remediated with script and configuration profiles
Stars: ✭ 23 (-36.11%)
Mutual labels:  cis, configuration-profile, jamf
CIS-for-macOS-High-Sierra
No description or website provided.
Stars: ✭ 15 (-58.33%)
Mutual labels:  cis, macosx, jamf
blade runner
Blade Runner is a Jamf Pro based Python application that automates and implements a framework to offboard, secure erase and document deprecated Mac systems.
Stars: ✭ 24 (-33.33%)
Mutual labels:  macosx, jamf
JAMF-Enrollment-Kickstart
A better enrollment kickoff for JAMF machines
Stars: ✭ 74 (+105.56%)
Mutual labels:  jamf
Mac-OS-Setup-Applications
👾 All I need to setup a new Mac and the applications I use everyday as a Web Developper
Stars: ✭ 96 (+166.67%)
Mutual labels:  macosx
example.kext
Makefile for building macOS kernel extensions
Stars: ✭ 66 (+83.33%)
Mutual labels:  macosx
macOS-Tips
macOS 系统的使用技巧介绍、常用软件推荐、效率工具推荐。
Stars: ✭ 23 (-36.11%)
Mutual labels:  macosx
homebrew.sh
Install homebrew via Jamf without giving users admin rights
Stars: ✭ 52 (+44.44%)
Mutual labels:  jamf
GNU-bash-mac-installer
Downloads and builds a Mac package installer for GNU bash 5
Stars: ✭ 17 (-52.78%)
Mutual labels:  macosx
mark
mark is an markdown editor app for mac
Stars: ✭ 47 (+30.56%)
Mutual labels:  macosx
pre-commit-macadmin
Pre-commit hooks for Mac admins.
Stars: ✭ 43 (+19.44%)
Mutual labels:  jamf
TheScopeReport
This is a Java program that calls the Jamf Pro API to collect scoping details.
Stars: ✭ 13 (-63.89%)
Mutual labels:  jamf
mac scripts
A collection of scripts used to Manage Mac OS X computers.
Stars: ✭ 38 (+5.56%)
Mutual labels:  jamf
inspec-gke-cis-benchmark
GKE CIS 1.1.0 Benchmark InSpec Profile
Stars: ✭ 27 (-25%)
Mutual labels:  cis
HEIC-to-JPG-right-click-converter
HEIC to JPG converter with one click integration into Mac OS X
Stars: ✭ 19 (-47.22%)
Mutual labels:  macosx
Jsonify
♨️A delightful JSON parsing framework.
Stars: ✭ 42 (+16.67%)
Mutual labels:  macosx
dist-detect
Try to determine what Linux/Unix distribution is running on a remote host and get a hint if security updates are applied.
Stars: ✭ 14 (-61.11%)
Mutual labels:  macosx
c3
𝗖𝟯 provides compliant AWS CDK components to various security standards.
Stars: ✭ 24 (-33.33%)
Mutual labels:  cis
Sculpt-Comfort-Mission-Control
Switch desktops on your Mac with any mouse
Stars: ✭ 117 (+225%)
Mutual labels:  macosx
mksqlite
A MATLAB Mex-DLL to access SQLite databases
Stars: ✭ 25 (-30.56%)
Mutual labels:  macosx

CIS for macOS High Sierra - Script and Configuration Profile Remediation

INFO:

Refers to document CIS_Apple_OSX_10.13_Benchmark_v1.0.0.pdf, available at https://benchmarks.cisecurity.org

USAGE:

  • Create Extension Attributes using the following scripts:

2.5_Audit_List Extension Attribute

Set as Data Type "String." Reads contents of /Library/Application Support/SecurityScoring/org_audit file and records to Jamf Pro inventory record.

2.6_Audit_Count Extension Attribute

Set as Data Type "Integer." Reads contents of /Library/Application Support/SecurityScoring/org_audit file and records count of items to Jamf Pro inventory record. Usable with smart group logic (2.6_Audit_Count greater than 0) to immediately determine computers not in compliance.

  1. After creation, make note of the ID number of these Extension Attributes. To find the ID, select the Extension Attribute then click into your browser's address bar. The ID number is after the "id=" in the URL.

  2. Add the following scripts to your Jamf Pro

  • 1_Set_Organization_Priorities
  • 2_Security_Audit_Compliance_ORG or 2_Security_Audit_Compliance_API
  • 3_Security_Remediation

Scripts 1_Set_Organization_Priorities and 2_Security_Audit_Compliance_API will need additional configuration prior to deployment.

1_Set_Organization_Priorities

Admins set organizational compliance for each listed item, which gets written to plist. The values default to "true," meaning if an organization wishes to disregard a given item they must set the value to false by changing the associated comment:

OrgScore1_1="true" or OrgScore1_1="false"

The script writes to /Library/Application Support/SecurityScoring/org_security_score.plist by default.

2_Security_Audit_Compliance_API

Configure the following variables in the script:

  • Line 42: Enter your Jamf Pro URL.
  • Lines 52 and 53: The values for "ENTER_SALT_HERE" and "ENTER_PASSWORD_HERE" are generated by the Encrypted Strings repo created by Bryson Tyrrell. (https://github.com/brysontyrrell/EncryptedStrings) To generate the values, paste the following into Terminal:
 function GenerateEncryptedString() {
    # Usage ~$ GenerateEncryptedString "String"
    local STRING="${1}"
    local SALT=$(openssl rand -hex 8)
    local K=$(openssl rand -hex 12)
    local ENCRYPTED=$(echo "${STRING}" | openssl enc -aes256 -a -A -S "${SALT}" -k "${K}")
    echo "Encrypted String: ${ENCRYPTED}"
    echo "Salt: ${SALT} | Passphrase: ${K}"
} 

Press return then enter

GenerateEncryptedString "Username_String"

replacing Username_String with a Jamf Pro API username that has PUT permission for Computer Extension Attributes. Save the output for later use and repeat this step with the API user's password. Enter the respective Salt and Password in lines 52 and 53.

  • Line 55: Enter the ID for the Extension Attribute 2.6_Audit_Count

  • Line 56: Enter the ID for the Extension Attribute 2.5_Audit_List

  • Add the configured script to your Jamf Pro server and configure the parameter labels for parameter 4 (API Username Encrypted String) and parameter 5 (API Password Encrypted String).

  • Create a single Jamf Policy using all three scripts.
    1_Set_Organization_Priorities - Script Priority: Before
    2_Security_Audit_Compliance_ORG or 2_Security_Audit_Compliance_API - Script Priority: Before
    3_Security_Remediation - Script Priority: Before
    2_Security_Audit_Compliance_ORG or 2_Security_Audit_Compliance_API - Script Priority: After

For script 2_Security_Audit_Compliance enter the values generated when you configured lines 52 and 53 in parameters 4 and 5.

  • Policy: Some recurring trigger to track compliance over time. Do not add Update Inventory if using the API script as the API entries in script 2_Security_Audit_Compliance will populate the appropriate Extension Attributes. If using 2_Security_Audit_Compliance_ORG, add Update Inventory.

NOTES:

  • Item "1.1 Verify all Apple provided software is current" is disabled by default.
  • Item "2.1.2 Turn off Bluetooth "Discoverable" mode when not pairing devices - not applicable to 10.9 and higher." Starting with OS X (10.9) Bluetooth is only set to Discoverable when the Bluetooth System Preference is selected. To ensure that the computer is not Discoverable do not leave that preference open.
  • Item "2.6.6 Enable Location Services (Not Scored)" is disabled by default. As of macOS 10.12.2, Location Services cannot be enabled/monitored programmatically. It is considered user opt in.
  • Item "2.6.7 Monitor Location Services Access (Not Scored)" is disabled by default. As of macOS 10.12.2, Location Services cannot be enabled/monitored programmatically. It is considered user opt in.
  • Item "2.8.1 Time Machine Auto-Backup " is disabled by default. Time Machine is typically not used as an Enterprise backup solution
  • Item "2.8.2 Time Machine Volumes Are Encrypted (Not Scored)" is disabled by default. Time Machine is typically not used as an Enterprise backup solution
  • Item "2.12 Securely delete files as needed (Not Scored)" is disabled by default. With the wider use of FileVault and other encryption methods and the growing use of Solid State Drives the requirements have changed and the "Secure Empty Trash" capability has been removed from the GUI.
  • Item "4.3 Create network specific locations (Not Scored)" is disabled by default.
  • Item "5.7 Automatically lock the login keychain for inactivity" is disabled by default.
  • Item "5.8 Ensure login keychain is locked when the computer sleeps" is disabled by default.
  • Item "5.9 Enable OCSP and CRL certificate checking" is disabled by default.
  • Item "5.19 Do not enter a password-related hint (Not Scored)" is disabled by default. Not needed if 6.1.2 Disable "Show password hints" is enforced.
  • Item "5.21 Secure individual keychains and items (Not Scored)" is disabled by default.
  • Item "5.22 Create specialized keychains for different purposes (Not Scored)" is disabled by default.
  • Item "6.4 Safari disable Internet Plugins for global use (Not Scored)" is disabled by default.
  • Item "6.5 Use parental controls for systems that are not centrally managed (Not Scored)" is disabled by default.

2_Security_Audit_Compliance_ORG or 2_Security_Audit_Compliance_API can be used in the policy.

2_Security_Audit_Compliance_ORG

Run this before and after 3_Security_Remediation to audit the Remediation Reads the plist at /Library/Application Support/SecurityScoring/org_security_score.plist. For items prioritized (listed as "true,") the script queries against the current computer/user environment to determine compliance against each item.

Non-compliant items are recorded at /Library/Application Support/SecurityScoring/org_audit

2_Security_Audit_Compliance_API

Run this before and after 3_Security_Remediation to audit the Remediation Reads the plist at /Library/Application Support/SecurityScoring/org_security_score.plist. For items prioritized (listed as "true,") the script queries against the current computer/user environment to determine compliance against each item.

Non-compliant items are recorded at /Library/Application Support/SecurityScoring/org_audit. Using the REST API, the values for Extension Attributes 2_5 and 2_6 are updated

3_Security_Remediation

Run 2_Security_Audit_Compliance after to audit the Remediation Reads the plist at /Library/Application Support/SecurityScoring/org_security_score.plist. For items prioritized (listed as "true,") the script applies recommended remediation actions for the client/user.

SCORED CIS EXCEPTIONS:

  • Does not implement pwpolicy commands (5.2.1 - 5.2.8)

  • Audits but does not actively remediate (due to alternate profile/policy functionality within Jamf Pro):

  • 2.4.4 Disable Printer Sharing
  • 2.6.1.1 Enable FileVault
  • 2.7.1 iCloud configuration (Check for iCloud accounts) (Not Scored)
  • 2.11 Java 6 is not the default Java runtime
  • 5.23 System Integrity Protection status
  • Audits but does not remediate (due to requirement to review the device)
  • 3.4 Control access to audit records

REMEDIATED USING CONFIGURATION PROFILES:

The following Configuration profiles are available in mobileconfig and plist form. If you wish to change a particular setting, edit the plist in question. Mobileconfigs can be uploaded to Jamf Pro Configuration Profiles as is and plists can be added to a new Configuration Profile as Custom Payloads.

CIS 10.13 Custom Settings mobileconfig

  • 1.2 Enable Auto Update
  • 1.4 Enable system data files and security update installed
  • 2.10 Enable Secure Keyboard Entry in terminal.app
  • 4.1 Disable Bonjour advertising service
  • 6.1.4 Disable "Allow guests to connect to shared folders"
  • 6.3 Disable the automatic run of safe files in Safari

CIS 10.13 LoginWindow Security_and_Privacy ScreenSaver mobileconfig

  • 2.3.1 Set an inactivity interval of 20 minutes or less for the screen saver
  • 2.3.2 Secure screen saver corners
  • 2.3.3 Set a screen corner to Start Screen Saver
  • 2.6.2 Enable Gatekeeper
  • 2.6.3 Enable Firewall
  • 2.6.4 Enable Firewall Stealth Mode
  • 2.6.5 Review Application Firewall Rules
  • 5.12 Disable automatic login
  • 5.13 Require a password to wake the computer from sleep or screen saver
  • 5.17 Create a custom message for the Login Screen
  • 5.20 Disable Fast User Switching (Not Scored)
  • 6.1.1 Display login window as name and password
  • 6.1.2 Disable "Show password hints"
  • 6.1.3 Disable guest account

CIS 10.13 Restrictions mobileconfig

  • 2.6.8 Disable sending diagnostic and usage data to Apple
  • 2.7.2 iCloud keychain (Not Scored)
  • 2.7.3 iCloud Drive (Not Scored)
  • 2.7.4 iCloud Drive Document sync
  • 2.7.5 iCloud Drive Desktop sync
  • 6.3 Disable the automatic run of safe files in Safari
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].